
The safer , easier way to help you pass any IT exams.
95 / 169
Non-repudiation is the ability to prove that the file uploaded and the file downloaded are identical.
Non-repudiation is an essential part of any secure file transfer solution
End-to-end file non-repudiation is the ability to prove who uploaded a specific file, who downloaded it, and
that the file uploaded and the file downloaded are identical. It is a security best practice and required by
Federal Information Security Management Act (FISMA), Gramm-Leach-Bliley Act (GLBA), Health
Insurance Portability and Accounta-bility Act (HIPAA), Sarbanes-Oxley Act (SOX), and others.
The ability to provide end-to-end file non-repudiation is an essential part of any secure file transfer
solution because it provides the following benefits.
* Guarantees the integrity of the data being transferred
* Plays a valuable forensic role if a dispute arises about the file
* Provides a capability that is required for Guaranteed Delivery
Providing end-to-end file non-repudiation requires using a secure file transfer server that can perform all
of the following activities:
* Authenticate each user who uploads or downloads a file
* Check the integrity of each file when uploaded and downloaded
* Compare the server and client-generated integrity check results
* Associate and log the authentication and check results
The cryptographically valid SHA1 and MD5 algorithms are widely used to do file integrity checking. SHA1
is the stronger of these, and is approved for file integrity checking under US Federal Information
Processing Standard FIPS 140-2. MOVEit secure file transfer server and MOVEit Automation MFT
automation server each have built-in FIPS 140-2 validated cryptographic modules that include the SHA1
and MD5 algorithms, which they use for file integrity checking.
389.After patching computers with the latest application security patches/updates, users are unable to
open certain applications.
Which of the following will correct the issue?
A. Modifying the security policy for patch management tools
B. Modifying the security policy for HIDS/HIPS
C. Modifying the security policy for DLP
D. Modifying the security policy for media control
Answer: C
390.Which of the following vulnerabilities can lead to unexpected system behavior, including the
bypassing of security controls, due to differences between the time of commitment and the time of
execution?
A. Buffer overflow
B. DLL injection
C. Pointer dereference
D. Race condition
Answer: C
Explanation:
Buffer overflow protection is any of various techniques used during software development to enhance the
security of executable programs by detecting buffer overflows on stack-allocated variables, and
preventing them from causing program misbehavior or from becomi
ng serious security vulnerabilities.